首页> 外文会议>IEEE Information Theory Workshop >Concentrated Stopping Set Design for Coded Merkle Tree: Improving Security Against Data Availability Attacks in Blockchain Systems
【24h】

Concentrated Stopping Set Design for Coded Merkle Tree: Improving Security Against Data Availability Attacks in Blockchain Systems

机译:CODED MERKLE树集中停止集设计:在区块链系统中提高数据可用性攻击的安全性

获取原文

摘要

In certain blockchain systems, light nodes are clients that download only a small portion of the block. Light nodes are vulnerable to data availability (DA) attacks where a malicious node hides an invalid portion of the block from the light nodes. Recently, a technique based on erasure codes called Coded Merkle Tree (CMT) was proposed by Yu et al. that enables light nodes to detect a DA attack with high probability. The CMT is constructed using LDPC codes for fast decoding but can fail to detect a DA attack if a malicious node hides a small stopping set of the code. To combat this, Yu et al. used well-studied techniques to design random LDPC codes with high minimum stopping set size. Although effective, these codes are not necessarily optimal for this application. In this paper, we demonstrate a more specialized LDPC code design to improve the security against DA attacks. We achieve this goal by providing a deterministic LDPC code construction that focuses on concentrating stopping sets to a small group of variable nodes rather than only eliminating stopping sets. We design these codes by modifying the Progressive Edge Growth algorithm into a technique called the entropy-constrained PEG (EC-PEG) algorithm. This new method demonstrates a higher probability of detecting DA attacks and allows for good codes at short lengths.
机译:在某些区块链系统中,光节点是仅下载块的一小部分的客户端。光节点容易受到数据可用性(DA)攻击的攻击,其中恶意节点隐藏来自光节点的块的无效部分。最近,由Yu等人提出了一种基于称为Coded Merkle树(CMT)的擦除码的技术。这使得光节点能够检测具有高概率的DA攻击。使用LDPC码构造CMT,以便快速解码,但如果恶意节点隐藏了代码的小型停止集,则无法检测到DA攻击。打击这个,yu等人。使用过于研究的技术来设计具有高最小停止设定尺寸的随机LDPC码。虽然有效,但这些代码不一定对本申请最佳。在本文中,我们展示了更专业的LDPC代码设计,以提高对DA攻击的安全性。我们通过提供确定性的LDPC代码结构来实现这一目标,该代码构造专注于将停止集集中到一小组可变节点,而不是仅消除停止集。我们通过将逐行边缘增长算法修改为称为熵约束PEG(EC-PEG)算法的技术来设计这些代码。该新方法展示了检测DA攻击的较高概率,并且允许短长度的良好代码。

著录项

相似文献

  • 外文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号